197 research outputs found

    On secure system performance over SISO, MISO and MIMO-NOMA wireless networks equipped a multiple antenna based on TAS protocol

    Get PDF
    This study examined how to improve system performance by equipping multiple antennae at a base station (BS) and all terminal users/mobile devices instead of a single antenna as in previous studies. Experimental investigations based on three NOMA down-link models involved (1) a single-input-single-output (SISO) scenario in which a single antenna was equipped at a BS and for all users, (2) a multi-input-single-output (MISO) scenario in which multiple transmitter antennae were equipped at a BS and a single receiver antenna for all users and (3) a multi-input-multi-output (MIMO) scenario in which multiple transmitter antennae were equipped at a BS and multiple receiver antenna for all users. This study investigated and compared the outage probability (OP) and system throughput assuming all users were over Rayleigh fading channels. The individual scenarios also each had an eavesdropper. Secure system performance of the individual scenarios was therefore also investigated. In order to detect data from superimposed signals, successive interference cancellation (SIC) was deployed for users, taking into account perfect, imperfect and fully imperfect SICs. The results of analysis of users in these three scenarios were obtained in an approximate closed form by using the Gaussian-Chebyshev quadrature method. However, the clearly and accurately presented results obtained using Monte Carlo simulations prove and verify that the MIMO-NOMA scenario equipped with multiple antennae significantly improved system performance.Web of Science20201art. no. 1

    E-model modification for case of cascade codecs arrangement

    Get PDF
    Speech quality assessment is one of the key matters of voice services and every provider should ensure adequate connection quality to end users. Speech quality has to be measured by a trusted method and results have to correlate with intelligibility and clarity of the speech, as perceived by the listener. It can be achieved by subjective methods but in real life we must rely on objective measurements based on reliable models. One of them is E-model that we can consider as mainly adopted method in IP telephony. This method is based on evaluation of transmission path impairments influencing speech signal, especially delays and packet losses. These parameters which are common in IP network can affect dramatically speech quality. In this article, a new modification of E-model, that takes into consideration the cascade codecs arrangement, is presented. The proposed a correction function improves the current computational non-intrusive approach that is described in recommendation ITU-T G.107, so-called E-model.Scopus551447143

    Security risks in IP telephony

    Get PDF
    This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT) as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against SPIT attacks. AntiSPIT represents an effective protection based on statistical blacklist and works without participation of the called party which is a significant advantage

    SIP threats detection system

    Get PDF
    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The developed application is distributed as an open-source and is equipped with four modules. The result is reported to the particular e-mail and information supplemeted to the report should help to improve the overall protection of the SIP server. The developed application represents effective tool which is able to point out the weaknesses of the tested system.Scopu

    On outage probability and throughput performance of cognitive radio inspired NOMA relay system

    Get PDF
    To improve the throughput and the outage probability of the Cognitive Radio (CR) inspired system, a novel Non-Orthogonal Multiple Access (NOMA) can be deployed to adapt multiple services in 5G wireless communication. In this scheme, after the reception of the superposition coded symbol with a predefined power allocation factors from the primary source, the relay decodes and forwards with a new superposition coded symbol (i.e. allocating another power factors) to the destination. By employing twin antenna design at the relay, the bandwidth efficiency in such scheme will be improved. Assuming Rayleigh fading channels, the closed-form expressions in terms of throughput and the outage performance are derived. Through numerical results, they showed that the outage performance of the proposed scheme using a Single Antenna (SA) scheme at the relay is better than a Twin Antenna (TA) scheme because SA scheme is not affected by its own antenna interference

    SIP registration stress test

    Get PDF
    This paper deals with a benchmarking of SIP infrastructure and improves the methodology of SIP performance evaluation further to better fit into the design of the SIP testing platform, which is being designed in the VSB – Technical University of Ostrava. By separating registrations from calls, we were able to measure both cases without the need of extensive postprocessing of data to ensure the data in one case is not affected by the ones from the other case. Moreover the security vulnerability of the SIP protocol has been harnessed to allow measuring software for performing both registrations and calls together but in individual processes, which builds the basis for planned and already mentioned modular design of the platform. In this paper, we present the results from separate registration stress tests and we explain the usage of the proposed SIP benchmarking methodology

    Toward designing a quantum key distribution network simulation model

    Get PDF
    As research in quantum key distribution network technologies grows larger and more complex, the need for highly accurate and scalable simulation technologies becomes important to assess the practical feasibility and foresee difficulties in the practical implementation of theoretical achievements. In this paper, we described the design of simplified simulation environment of the quantum key distribution network with multiple links and nodes. In such simulation environment, we analyzed several routing protocols in terms of the number of sent routing packets, goodput and Packet Delivery Ratio of data traffic flow using NS-3 simulator

    Wireless powered D2D communications underlying cellular networks: design and performance of the extended coverage

    Get PDF
    Because of the short battery life of user equipments (UEs), and the requirements for better quality of service have been more demanding, energy efficiency (EE) has emerged to be important in device-to-device (D2D) communications. In this paper, we consider a scenario, in which D2D UEs in a half-duplex decode-and-forward cognitive D2D communication underlying a traditional cellular network harvest energy and communicate with each other by using the spectrum allocated by the base station (BS). In order to develop a practical design, we achieve the optimal time switching (TS) ratio for energy harvesting. Besides that, we derive closed-form expressions for outage probability, sum-bit error rate, average EE and instantaneous rate by considering the scenario when installing the BS near UEs or far from the UEs. Two communication types are enabled by TS-based protocol. Our numerical and simulation results prove that the data rate of the D2D communication can be significantly enhanced.Web of Science58439939

    Multi-points cooperative relay in NOMA system with N-1 DF relaying nodes in HD/FD mode for N user equipments with energy harvesting

    Get PDF
    Non-Orthogonal Multiple Access (NOMA) is the key technology promised to be applied in next-generation networks in the near future. In this study, we propose a multi-points cooperative relay (MPCR) NOMA model instead of just using a relay as in previous studies. Based on the channel state information (CSI), the base station (BS) selects a closest user equipment (UE) and sends a superposed signal to this UE as a first relay node. We have assumed that there are N UEs in the network and the N-th UE, which is farthest from BS, has the poorest quality signal transmitted from the BS compared the other UEs. The N-th UE received a forwarded signal from N - 1 relaying nodes that are the UEs with better signal quality. At the i-th relaying node, it detects its own symbol by using successive interference cancellation (SIC) and will forward the superimposed signal to the next closest user, namely the (i + 1)-th UE, and include an excess power which will use for energy harvesting (EH) intention at the next UE. By these, the farthest UE in network can be significantly improved. In addition, closed-form expressions of outage probability for users over both the Rayleigh and Nakagami-m fading channels are also presented. Analysis and simulation results performed by Matlab software, which are presented accurately and clearly, show that the effectiveness of our proposed model and this model will be consistent with the multi-access wireless network in the future.Web of Science82art. no. 16

    Human abnormal behavior impact on speaker verification systems

    Get PDF
    Human behavior plays a major role in improving human-machine communication. The performance must be affected by abnormal behavior as systems are trained using normal utterances. The abnormal behavior is often associated with a change in the human emotional state. Different emotional states cause physiological changes in the human body that affect the vocal tract. Fear, anger, or even happiness we recognize as a deviation from a normal behavior. The whole spectrum of human-machine application is susceptible to behavioral changes. Abnormal behavior is a major factor, especially for security applications such as verification systems. Face, fingerprint, iris, or speaker verification is a group of the most common approaches to biometric authentication today. This paper discusses human normal and abnormal behavior and its impact on the accuracy and effectiveness of automatic speaker verification (ASV). The support vector machines classifier inputs are Mel-frequency cepstral coefficients and their dynamic changes. For this purpose, the Berlin Database of Emotional Speech was used. Research has shown that abnormal behavior has a major impact on the accuracy of verification, where the equal error rate increase to 37 %. This paper also describes a new design and application of the ASV system that is much more immune to the rejection of a target user with abnormal behavior.Web of Science6401274012
    corecore